Rights on RODC object
Last updated
Was this helpful?
Last updated
Was this helpful?
With administrative control over the computer object in the Active Directory, there is a path to fully compromise the domain. It is possible to modify the RODC’s msDS-NeverRevealGroup
and msDS-RevealOnDemandGroup
attributes to allow a Domain Admin to authenticate and dump his credentials via administrative access over the RODC host.
Alternative #1: using
Then, dump the krbtgt_XXXXX
key on the RODC server with admin access on the host (this can be done by modifying the managedBy
attribute for example), and use it to forge a and conduct a to retrieve the domain Administrator's password hash.
Alternative #2: (Python) can be used to modify the LDAP attribute.
From Windows systems, (PowerShell) can be used for this purpose.
Then, dump the krbtgt_XXXXX
key on the RODC server with admin access on the host (this can be done by modifying the managedBy
attribute for example), and use it to forge a and conduct a to retrieve the domain Administrator's password hash.